Console Login

#security

All articles tagged with security

#security

Zero-Trust Infrastructure: Why the "Castle and Moat" is Failing Your Norwegian Data

The perimeter is dead. With GDPR enforcement looming in 2018, relying on a VPN is no longer sufficient. We dissect how to implement Google-style Zero Trust architecture using standard Linux tools and CoolVDS KVM instances.

Kill the Castle-and-Moat: Implementing Zero-Trust Security on Linux Infrastructure (2017 Edition)

The perimeter is dead. With GDPR enforcement looming and sophisticated threats bypassing traditional firewalls, relying on a VPN is no longer enough. Here is how to architect a Zero-Trust environment using standard Linux tools on high-performance KVM architecture.

Automating Security Compliance: Surviving the 2018 Regulatory Shift with Ansible and OpenSCAP

With the new EU data regulations looming, manual server hardening is a liability. Learn how to automate security baselines on CentOS 7 using Ansible and OpenSCAP, ensuring your infrastructure meets Norwegian Datatilsynet standards before the audit hits.

Zero-Trust Architecture in 2017: Why Your VPN is a False Sense of Security

The 'castle-and-moat' security model is dead. Learn how to implement Google-style BeyondCorp principles using Nginx mTLS, rigorous segmentation, and Norwegian data sovereignty on CoolVDS.

Container Security is a Minefield: Hardening Docker for Production in 2017

Default Docker configurations are dangerous. Learn how to drop capabilities, enforce non-root users, and isolate kernels to satisfy Datatilsynet and sleep at night.

Container Security in 2017: Locking Down Docker Production Environments in Norway

Containers are not magic security boxes. From kernel exploits to network breaches, here is how to harden your Docker stack before the GDPR deadline hits.

Automating Security Compliance: Surviving the GDPR Prep on Bare-Metal KVM

With the GDPR deadline looming in 2018, manual server hardening is a liability. Learn how to automate security baselines using Ansible and OpenSCAP on Norwegian infrastructure.

Kill the VPN: Why Zero-Trust Architecture is the Only Way to Survive 2017

The perimeter firewall is dead. With GDPR looming in 2018, relying on a 'trusted internal network' is negligence. Here is how to lock down your infrastructure using standard Linux tools, paranoia, and CoolVDS isolation.

Perimeter Security is Dead: Implementing a Zero-Trust Architecture on Linux in 2017

With the GDPR enforcement date looming, the traditional 'castle and moat' security strategy is becoming a liability. We dismantle the perimeter and build a Zero-Trust model using KVM isolation, micro-segmentation, and rigorous identity management.

The Perimeter is Dead: Implementing a Zero-Trust Architecture on Linux Infrastructure

The 'castle-and-moat' security strategy is failing. In a world of ransomware and looming GDPR regulations, here is how to implement a Zero-Trust model using standard Linux tools available today.

Surviving the Inevitable: A DevOps Guide to Disaster Recovery in Norway (2017 Edition)

Hope is not a strategy. Learn how to architect robust disaster recovery plans using rsync, Percona XtraBackup, and KVM snapshots, specifically tailored for Norwegian data compliance requirements.

The Perimeter is a Lie: Implementing Zero-Trust Architecture on Linux Infrastructure

The traditional VPN-based security model is failing. Learn how to implement a Zero-Trust architecture using KVM isolation, strict iptables segmentation, and mutual TLS to future-proof your Norwegian hosting stack before the 2018 GDPR enforcement.

Disaster Recovery Protocols: Why Your "Backups" Are Not Enough (And How to Fix It)

It is February 2017. Ransomware is evolving, and relying on simple snapshots is a career-ending mistake. This guide covers RTO/RPO strategies, automated off-site replication scripts, and why Norwegian data sovereignty matters more than ever.

The Fortress Is Dead: Implementing "Zero Trust" Architecture on Linux Infrastructure

Perimeter security is no longer sufficient. Learn how to implement a Zero Trust model using Nginx mTLS, strict SSH 2FA, and segmented networking on KVM VPS, preparing your stack for the upcoming 2018 GDPR enforcement.

The Perimeter is Dead: Implementing Zero-Trust Architecture on Linux (2017 Guide)

The traditional VPN castle-and-moat security model is obsolete. With GDPR looming, learn how to implement Google-style BeyondCorp principles using Nginx mTLS, iptables, and strict KVM isolation.

Killing the Castle: Building a Zero-Trust Infrastructure on Linux in 2017

The 'perimeter' security model is dead. With GDPR looming and ransomware evolving, reliance on a single firewall is negligence. Here is how to implement a pragmatic Zero-Trust architecture on your VPS right now.

The Death of the Perimeter: Implementing Zero-Trust Architecture in 2017

The 'castle and moat' security strategy is obsolete. With GDPR enforcement looming and sophisticated lateral attacks on the rise, Norwegian CTOs must pivot to a Zero-Trust model. Here is how to implement Google-style BeyondCorp security on your Linux infrastructure today.

Docker Security in 2017: Why Your Container Strategy is a Ticking Time Bomb

We analyze the Dirty COW aftermath, user namespaces in Docker 1.12, and why true KVM isolation on Norwegian soil is your only defense against shared-kernel vulnerabilities.

Zero-Trust Architecture on Linux: Hardening Your VPS Against the 'Soft Shell' Fallacy

The 'Castle and Moat' security strategy is dead. In this guide, we dismantle the perimeter and implement strict access controls, 2FA SSH, and encrypted tunnels on Ubuntu 16.04, ensuring your data in Norway remains untouchable.

Locking Down Docker: A Container Security Survival Guide for 2016

The recent Dirty COW exploit was a wake-up call: containers are not sandboxes. In this deep dive, we explore how to harden Docker 1.12, manage kernel capabilities, and why running containers inside KVM slices is the only way to sleep at night.

Hardening Docker 1.12: Container Security in a Post-Dirty COW World

The 'Dirty COW' exploit woke everyone up. Here is a battle-tested guide to locking down containers on Linux, why KVM is mandatory for true isolation, and how to navigate Norwegian data privacy in late 2016.

Automating Infrastructure Compliance: Preparing for the GDPR Era with Ansible

With the Safe Harbor framework invalidated and new EU regulations looming, manual security hardening is a liability. Learn how to automate server compliance using Ansible on CentOS 7 to satisfy auditors and secure your Nordic infrastructure.

Zero-Trust Architecture: Why Your Firewall is a False Idol (And How to Fix It)

The 'castle and moat' security strategy is dead. Learn how to implement a Zero-Trust architecture on Linux using Nginx mTLS, hardened SSH, and strict iptables rules on your VPS.

Docker in Production: Locking Down Containers Before They Break Your Infrastructure

It is October 2016, and everyone is rushing to containerize. But default Docker settings are a security nightmare waiting to happen. Here is how to harden your stack using namespaces, capabilities, and KVM isolation.

Automating Compliance: Surviving the GDPR Shift with Infrastructure as Code

With the EU's new data protection regulations looming, manual server hardening is a liability. Learn how to automate security compliance using Ansible on strict KVM infrastructure.

Stop SSH-ing into Production: Mastering Git-Centric Infrastructure in 2016

Manual deployments are a ticking time bomb. Learn how to implement a 'Git-Driven' workflow using Docker, Jenkins, and KVM virtualization to automate your Nordic infrastructure.

Container Isolation Myths: Hardening Docker 1.12 on Production Linux Systems

Docker is not a virtualization strategy; it is a delivery mechanism. We dissect kernel namespaces, capability dropping, and why running containers on KVM-backed infrastructure is the only way to satisfy Norwegian compliance standards.

Container Security in 2016: Stop Exposing Your Kernel to Script Kiddies

Docker is revolutionizing deployment, but default configurations are a security nightmare. Learn how to lock down your containers, drop capabilities, and why KVM virtualization is your last line of defense.

Automating Security Compliance: A CTO’s Guide to Hardening Infrastructure in Norway (2016 Edition)

With the recent invalidation of Safe Harbor and the looming EU Data Protection Reform, manual security is a liability. Learn how to automate server hardening on CentOS 7 and Ubuntu 16.04 using Ansible to satisfy Datatilsynet requirements.

Container Security: Stop Treating Docker Like a VM (2016 Edition)

It's September 2016, and Docker is everywhere. But most deployments in Norway are fundamentally insecure. Here is the battle-hardened guide to locking down your containers before you leak data.